Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 1 Rating

Total
ease
features
design
support

Description

Gain a true understanding of your vulnerabilities with our innovative approach. Uncover what is revealed through our black-box methodology as IBM Security Randori Recon creates a comprehensive map of your attack surface, identifying exposed assets whether they are on-premises or in the cloud, as well as shadow IT and misconfigured systems that could be exploited by attackers but may go unnoticed by you. Unlike conventional ASM solutions that depend solely on IPv4 range scans, our distinctive center of mass technique allows us to discover both IPv6 and cloud assets that others often overlook. IBM Security Randori Recon ensures you target the most critical exposures swiftly, automatically prioritizing the software that attackers are most likely to exploit first. Designed by professionals with an attacker’s perspective, Randori Recon uniquely delivers a real-time inventory of every instance of vulnerable and exploitable software. This tool transcends standard vulnerability assessments by examining each target within its context to generate a personalized priority score. Moreover, to truly refine your defenses, it is essential to engage in practical exercises that simulate real-world attack scenarios, enhancing your team's readiness and response capabilities.

Description

Map your cloud identity attack surface and secure it against identity-based attacks. Push is an identity security platform for cloud-first businesses. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and uncover vulnerabilities that can be exploited by identity-based attacks. - Get real-time visibility of all your employees' cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. Prevent your employees creating new identity vulnerabilities. - Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk. Push supports Google Chrome, Microsoft Edge, Firefox, Safari, Brave and Opera.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Axonius
Google Workspace
IBM QRadar SIEM
LogicHub
Microsoft 365
Microsoft Azure
Microsoft Teams
Panaseer
Qualys TruRisk Platform
Rapid7 InsightIDR
ServiceNow
Slack
Splunk Enterprise
Splunk SOAR
Tenable One

Integrations

Axonius
Google Workspace
IBM QRadar SIEM
LogicHub
Microsoft 365
Microsoft Azure
Microsoft Teams
Panaseer
Qualys TruRisk Platform
Rapid7 InsightIDR
ServiceNow
Slack
Splunk Enterprise
Splunk SOAR
Tenable One

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$5 per employee per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/randori-recon

Vendor Details

Company Name

Push Security

Founded

2019

Country

United Kingdom

Website

pushsecurity.com

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Alternatives

Alternatives

SailPoint Reviews

SailPoint

SailPoint Technologies
Tenable One Reviews

Tenable One

Tenable